
Int J Performability Eng ›› 2026, Vol. 22 ›› Issue (2): 77-87.doi: 10.23940/ijpe.26.02.p3.7787
• Original article • Previous Articles Next Articles
Callistus Tochukwu Ikwuazoma,*, Francisca Nonyelum Ogwuelekaa, Mohammed Baba Hammawaa, and Rajesh Prasadb
Submitted on
;
Revised on
;
Accepted on
Contact:
Callistus Tochukwu Ikwuazom
About author:Callistus Tochukwu Ikwuazom, Francisca Nonyelum Ogwueleka, Mohammed Baba Hammawa, and Rajesh Prasad. HEA-NIDS: A Hybrid-Ensemble Anomaly Detection System for Mitigating Network Intrusions and DDoS Precursors in Cloud Storage Environments [J]. Int J Performability Eng, 2026, 22(2): 77-87.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
| [1] |
Kirchoff D.F., Xavier M., Mastella J., and De Rose C.A., 2019. A preliminary study of machine learning workload prediction techniques for cloud applications. In 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 222-227.
|
| [2] |
Gupta S., Gupta A., and Shankar G., 2021. Cloud computing: services, deployment models and security challenges. In 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp. 414-418.
|
| [3] |
Al-Mazrawe A., and Al-Musawi B., 2024. Anomaly detection in cloud network: A review. In BIO Web of Conferences, EDP Sciences, 97, pp. 00019.
|
| [4] |
Mehmood M., Amin R., Muslam M.M.A., Xie J., and Aldabbas H., 2023. Privilege escalation attack detection and mitigation in cloud using machine learning. IEEE Access, 11, pp. 46561-46576.
|
| [5] |
Becerra-Suarez F.L., Fernández-Roman I., and Forero M.G., 2024. Improvement of distributed denial of service attack detection through machine learning and data processing. Mathematics, 12(9), 1294.
|
| [6] |
Kandhro I.A., Alanazi S.M., Ali F., Kehar A., Fatima K., Uddin M., and Karuppayah S., 2023. Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access, 11, pp. 9136-9148.
|
| [7] |
Sreeramulu M.D., Suganyadevi K., Neravetla A.R., and Mohammed A.S., 2024. Network intrusion detection in cloud computing environments. In 2024 IEEE 3rd World Conference on Applied Intelligence and Computing (AIC), pp. 1431-1437.
|
| [8] |
Bouzaachane K., Guarmah E.M.E., Alnajim A.M., and Khan S., 2025. Addressing modern cybersecurity challenges: A hybrid machine learning and deep learning approach for network intrusion detection. Computers, Materials & Continua, 84(2).
|
| [9] |
Gouda H.A., Ahmed M.A., and Roushdy M.I., 2024. Optimizing anomaly-based attack detection using classification machine learning. Neural Computing and Applications, 36(6), pp. 3239-3257.
|
| [10] |
Gu Z., Lopez D.T., Alrahis L., and Sinanoglu O., 2024. Always be pre-training: representation learning for network intrusion detection with GNNs. In 2024 25th International Symposium on Quality Electronic Design (ISQED), pp. 1-8.
|
| [11] |
Hakimi R., and Shalannanda W., 2025. A consensus-based feature selection and classifier benchmarking for network anomaly detection. Journal of Engineering and Scientific Research, 7(1), pp. 31-39.
|
| [12] |
Farhan M., Waheed Ud Din H., Ullah S., Hussain M.S., Khan M.A., Mazhar T., Khattak U.F., and Jaghdam I.H., 2025. Network-based intrusion detection using deep learning technique. Scientific Reports, 15(1), 25550.
|
| [13] |
Alzubi Q.M., Makhadmeh S.N., and Sanjalawe Y., 2025. Optimizing intrusion detection: advanced feature selection and machine learning techniques using the CSE-CIC-IDS2018 dataset. Journal of Advances in Information Technology, 16(3).
|
| [14] |
Ahmed U., Nazir M., Sarwar A., Ali T., Aggoune E.H.M., Shahzad T., and Khan M.A., 2025. Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering. Scientific Reports, 15(1), 1726.
|
| [15] |
Ahmed H.A., Hameed A., and Bawany N.Z., 2022. Network intrusion detection using oversampling technique and machine learning algorithms. PeerJ Computer Science, 8, e820.
|
| [16] |
Abdelkhalek A., and Mashaly M., 2023. Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning. Journal of Supercomputing, 79(10).
|
| [17] |
Vu L., Nguyen Q.U., Nguyen D.N., Hoang D.T., and Dutkiewicz E., 2022. Deep generative learning models for cloud intrusion detection systems. IEEE Transactions on Cybernetics, 53(1), pp. 565-577.
|
| [18] |
Yin B., Bu B., Gao B., and Li Q., 2022. A hybrid intrusion detection method using improved stacking ensemble algorithm and false positive elimination strategy for CBTC. In 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), pp. 4253-4258.
|
| [19] |
Mhawi D.N., Aldallal A., and Hassan S., 2022. Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems. Symmetry, 14(7), 1461.
|
| [20] |
Manzoor S., Ahmad M., and Alhadawi H.S., 2022. Intrusion detection system using ensemble machine learning in cloud environment. In International Conference on Emerging Technologies and Intelligent Systems, pp. 513-522.
|
| [21] |
Reddy K.B., and Meera S., 2024. DDoS attack detection in cloud using ensemble model tuned with optimal hyperparameter. International Journal of Adaptive Control and Signal Processing, 38(5), pp. 1594-1620.
|
| [22] |
Bingu R., and Jothilakshmi S., 2023. Design of intrusion detection system using ensemble learning technique in cloud computing environment. International Journal of Advanced Computer Science and Applications, 14(5).
|
| [23] |
Bakro M., Kumar R.R., Alabrah A.A., Ashraf Z., Bisoy S.K., Parveen N., Khawatmi S., and Abdelsalam A., 2023. Efficient intrusion detection system in the cloud using fusion feature selection approaches and an ensemble classifier. Electronics, 12(11), 2427.
|
| [24] |
Wang C., Sun Y., Wang W., Liu H., and Wang B., 2023. Hybrid intrusion detection system based on combination of random forest and autoencoder. Symmetry, 15(3), 568.
|
| [1] | Vaishali N. Rane, and Arunkumar M S. Autoencoder-Guided ML for Real-Time IoT Anomaly Detection [J]. Int J Performability Eng, 2026, 22(2): 67-76. |
| [2] | Rajesh Prasad, Gracy Gupta, Kanishka Agarwal, Malika Garg, and Mohd Asjad Raza Ansari. Real-Time Fault Detection in Industrial Machinery using Thermal Imaging and Machine Learning [J]. Int J Performability Eng, 2025, 21(9): 529-539. |
| [3] | Huthaifa Al-Khazraji, Mohammed Majid Msallam. A Two-Stage Model for Condition-Based Maintenance using Machine Learning Algorithms [J]. Int J Performability Eng, 2025, 21(8): 422-428. |
| [4] | Vikas, Rajesh Prasad, Santosh Kumar Upadhyay, Amit Kumar. Zero Trust-Driven Anomaly Detection Framework for Wireless Sensor Networks [J]. Int J Performability Eng, 2025, 21(8): 463-471. |
| [5] | Sushant Kumar Singh. Emotion-Aware Music Recommendation System using Facial Expression Analysis [J]. Int J Performability Eng, 2025, 21(6): 326-331. |
| [6] | Sumit Badotra. Machine Learning Enabled Model Against DDoS Detection using Software Defined Networking [J]. Int J Performability Eng, 2025, 21(4): 219-225. |
| [7] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. A Review of Software Fault Prediction Techniques in Class Imbalance Scenarios [J]. Int J Performability Eng, 2025, 21(3): 123-130. |
| [8] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
| [9] | Preety and Pushpendra Kumar Verma. Managing AI-Powered Cyber Threats, Adversarial Attacks, and Ensuring Ethical AI Alignment with Human Values [J]. Int J Performability Eng, 2025, 21(12): 673-685. |
| [10] | Ram Chatterjee, Mrinal Pandey, Hardeo Kumar Thakur, and Anand Gupta. Fortifying Fake Review Detection using Feature Engineered Revised Star Rating and Explainable AI [J]. Int J Performability Eng, 2025, 21(12): 697-704. |
| [11] | Puneet Chauhan and Shashiraj Teotia. Real-Time Behavioral Analysis for Ransomware Response: A Framework Leveraging Machine Learning and Threat Intelligence Feeds [J]. Int J Performability Eng, 2025, 21(11): 639-650. |
| [12] | Moudjib Errahmane Benzitouni and Abdelhakim Hannousse. Intrusion Detection System using Outlier Analysis for Adaptive Detection of Unknown Attacks [J]. Int J Performability Eng, 2025, 21(11): 661-671. |
| [13] | Arpna Saxena and Sangeeta Mittal. CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks [J]. Int J Performability Eng, 2025, 21(1): 36-47. |
| [14] | Seema Kalonia and Amrita Upadhyay. Comparative Analysis of Machine Learning Model and PSO Optimized CNN-RNN for Software Fault Prediction [J]. Int J Performability Eng, 2025, 21(1): 48-55. |
| [15] | Vikas Kumar, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment [J]. Int J Performability Eng, 2024, 20(9): 541-551. |
|
||